I can understand why they support FAT32 but why would someone
really want to use it?
FATxx is far easier for data recovery:
- it's well documented
- hand-editing tools are available
- user-controlled file system repair tools are available
- all file system structure is at "front" in predictable location
- avoids rich and possibly exploitable feature set, e.g. ADS
- doesn't change with new OS versions or SPs
- compatible with older OSs etc.
FATxx is less efficient where large single files (hard upper limit
that becomes a real problem in an age of DVD images) and large numbers
of files in a single directory. But when it comes to IMO the most
crucial job of a file system - do not lose data - I'd feel safer off
NTFS. So just as I'd not want to fly with an aerobatic specialist who
is prone to eplieptic fits every now and then, I'd rather use a file
system that doesn't eat data automatically and can be fixed manually.
A 2G FAT16 is very survivable for small data files that may exist in
one of the large clusters, so needing only a dir pointer to recover.
You can peel the whole thing off for "offline" recovery.
When working on larger FATxx volumes, you can backup the "front" of
the file system (from boot record to end of 2nd FAT), edit this, copy
files off with that particular pair of FATs in effect, undo the edits,
etc. Try that with NTFS; the relevant chaining info etc. are
splattered all over the volume, so even if you could get your head
around visualizing everything in raw hex, you would not be able to
save and restore the chaining info between copy-offs.
I do remember that and I always disabled it.
Yep. At least Outlook 2000 and later stopped jouneling Office data
files by default; that was also a pain.
Leading to the inevitable "doesnt work" syndrome when a future OS comes out
that doesnt use that method any longer.
I don't think that's more likely to be an issue than any other APIs.
It depends on what you mean by "operating ahead of intent". Eg, the software
HAS to assume, by default, certain things.
Not many.
For example, until I write to a non-OS disk, I don't want that disk
written to (maybe it's a sick HD I'm trying to recover data from?)
For example, there may be files present that I have NO intention to
ever "open" or use; I may in fact select them because I want to delete
them without Recycle Bin recoverability. So until I "open" a file, or
take an interest in its Properties by rt-clicking it etc., I do not
want the OS groping anything beyond the legact "DOS" dir entry.
So, we need anti virus programs.
Sure, but that has nothing to do with any of the above. Having an av,
resident or otherwise, does NOT make it safe for the OS to grope files
that I have shown no intention to grope or "open".
They operate ahead of intent and I have to tell you that doing so is a
good thing in many cases.
Yes, av does operate ahead of user intent, tho generally only when
files are selected or listed (I turn off sheduled "whole system"
scans). And av is indeed an exploitable surface; what helps is that
there is no single dominant or always-present av to exploit. That's a
strong reason for MS not to bundle an av as part of the OS.
THAT is where working ahead of the user's intent is a good thing.
I'd agree, tho circumstances may require you do disable this in a
hurry (i.e. if a malware comes out that does exploit the av).
But to take the risk of triggering malware, on the off-chance I may be
too dumb to know where I saved my stuff? I don't think so.
If the OS had evolved to an awareness of risky material, separating
this out into a "suspect" subtree instead of murking it in with user
data, then it would be meaningful to enable such behaviors in some
"places" and have it off in others. Vista has only just begun to show
the glimmerings of such clue (e.g. Downloads as a new shell folder).
I understand why you do that but I work in the industry fixing those
problems for businesses and home users
Me2. I set PCs up with the above logic when I build them, and on
first contact with "unwashed" PCs. I do NOT leave MS duhfaults like
1G web caches, IE dumping in "My Docs", file name extensions hidden,
admin shares waving around etc. in place.
Learn once, learn right.
I have an AV prog that is auto in every respect
I have one av resident, though not patched into the email access (esp.
on dialup, where this can cause silent loss of outgoing mail when the
email app auto-disconnects before the av sends the stuff out). I like
av and scanners that update themselves, but I don't like more than one
that auto-scans files on contact, and I don't like whole-system scans.
I do like automatic overnight scans of the "suspect" subtree, using
multiple av in series, though I seldom impliment this except for
certain hi-risk installations.
I chase suspected active malware fornmally (i.e. "scan from orbit"
when the infected installation is NOT running, using Bart etc.)
three big rules for serious computer
users who value their data are simply:
1) Backup.
2) Backup.
3) After 1 and 2, Backup.
Nah. Backup's useful, but it doesn't solve all problems, and as a
general solution, "just backup" is as uselessly simplistic as "just
re-install Windows". I'm not saying "don't bother to backup:, but I
am saying backups will not make other maintenance redundant.
To be effective (or even relevant), backup has to scope in all wanted
content and changes and scope out all unwanted content and changes.
Unless you've very carefully designed your data locations, separating
out infectable and incoming material, you can't be sure your most
recent backup will be malware-free.
Even if you break integrations by wiping and rebuilding the system
before restoring the "data" backup, you may be open to
self0integration via exploitation of internal surfaces... which is
where we came in, fretting about indexers and "rich" listings.
I used to use Nortons Ghost and found, when C drive died, that two weeks of
backups didnt work on the other drive as they were corrupt. Fortunately the
one from 3 weeks ago was OK but I lost 3 weeks of data. I dont use Ghost any
longer.
I automate a daily, 5-day-deep backup for small key data, which is
highly survivable, especially when combined with matrix cross-backup
storage in a serverless network environment.
Even so, the need for data recovery does not go away, and with folks
generating huge collections of precious photos, fully-automated data
backup is becoming even more of a challenge.
--------------- ---- --- -- - - - -
Saws are too hard to use.
Be easier to use!